Go to file
Brent Cook a9a1146155 fix more ssh option hashes 2016-09-20 01:30:35 -05:00
.github Fix link 2016-02-22 15:14:38 -06:00
app Move shared example from pro into framework 2016-04-07 13:09:52 -05:00
config Land #6556, include Vagrant development environment provisioner 2016-06-09 09:55:37 -05:00
data Land #7283, add jsp payload generator 2016-09-16 14:37:59 -05:00
db still trying to fix these migrations 2016-05-11 14:54:40 -05:00
documentation Land #7322, drupal_drupageddon module docs 2016-09-16 00:40:18 -05:00
external add exploit for cve-2016-0189 2016-08-01 13:26:35 -05:00
features Apparently the tests expected the typo in DATABASE. 2016-07-28 17:40:37 -05:00
lib Merge branch 'master' into bug/7321/fix-ssh-modules 2016-09-19 15:27:37 -05:00
modules fix more ssh option hashes 2016-09-20 01:30:35 -05:00
plugins Fix #7267, Fix Wrong IDs on openvas plugin 2016-09-10 09:37:49 +09:00
script
scripts typo 2016-08-13 08:22:41 -05:00
spec use new rex-encoder gem 2016-09-14 12:07:26 -05:00
test replace old rex::ui::text::table refs 2016-08-10 13:30:09 -05:00
tools replace old rex::ui::text::table refs 2016-08-10 13:30:09 -05:00
.gitignore Merge branch 'master' into vagrant 2016-02-20 09:10:17 -07:00
.gitmodules
.mailmap And Thao, too! 2016-07-01 16:10:21 -04:00
.rspec
.rubocop.yml
.ruby-gemset
.ruby-version bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.simplecov
.travis.yml bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md Add note about release notes to CONTRIBUTING.md 2016-08-22 15:15:22 -05:00
COPYING
Gemfile fix deps 2016-05-13 13:34:18 -05:00
Gemfile.local.example
Gemfile.lock Land #7316, use new rex-encoder gem 2016-09-19 11:59:21 -05:00
HACKING
LICENSE
README.md
Rakefile
Vagrantfile switch to inline provisioning, use official ubuntu vagrant box 2016-06-09 09:50:15 -05:00
metasploit-framework.gemspec use new rex-encoder gem 2016-09-14 12:07:26 -05:00
msfconsole
msfd
msfrpc
msfrpcd
msfupdate File.exists? must die 2016-04-21 00:47:07 -04:00
msfvenom Sort msfvenom --help-platforms 2016-08-25 14:02:58 -05:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.